Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIA Practice Exam with Questions & Answers

Questions 1

You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:

45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72

Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

Options:
A.

41, UDP

B.

16, ICMP

C.

41, TCP

D.

16, UDP

GIAC GCIA Premium Access
Questions 2

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

GCIA Question 2

Which of the following tools is John using to crack the wireless encryption keys?

Options:
A.

PsPasswd

B.

AirSnort

C.

Cain

D.

Kismet

Questions 3

Rick works as the Network Administrator of Baby Blue Inc. He wants to upgrade the existing network to the Active Directory based Windows 2000 network.

He configures a DNS on the network. Which of the following is the primary reason that the DNS is required in an Active Directory environment?

Options:
A.

Without installing the DNS, you cannot install the Active Directory in the network.

B.

Netlogon uses the DNS to find a domain controller in the network.

C.

The Active Directory uses the DNS zone transfer protocol during replication.

D.

The Active Directory is stored within the DNS database.

Questions 4

In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?

Options:
A.

Insertion

B.

Session splicing

C.

Fragmentation overlap

D.

Fragmentation overwrite

Questions 5

Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption, and data compression?

Options:
A.

Network layer

B.

Data-link layer

C.

Presentation layer

D.

Transport layer

Questions 6

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:
A.

Text Semagrams

B.

Linguistic steganography

C.

Technical steganography

D.

Perceptual masking

Questions 7

An IDS is a group of processes working together in a network. These processes work on different computers and devices across the network. Which of the following processes does an IDS perform?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Network traffic analysis

B.

Event log analysis

C.

Monitoring and analysis of user and system activity

D.

Statistical analysis of abnormal traffic patterns

Questions 8

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

GCIA Question 8

Which of the following tools can be used as a countermeasure to such an attack?

Options:
A.

Obiwan

B.

SmashGuard

C.

Kismet

D.

Absinthe

Questions 9

You are planning DNS configuration for your company. You decide to configure an Active Directory integrated DNS.

Which of the following are the benefits of Active Directory integrated DNS configuration?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Replication is more efficient.

B.

Multi-master environments are more fault tolerant.

C.

Single-master environment is simpler to administer.

D.

It results in enhanced security.

Questions 10

By gaining full control of router, hackers often acquire full control of the network. Which of the following methods are commonly used to attack Routers?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

By launching Sequence++ attack

B.

Route table poisoning

C.

By launching Social Engineering attack

D.

By launching Max Age attack

Questions 11

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate and examine drive image of a compromised system, which is suspected to be used in cyber crime. Adam uses Forensic Sorter to sort the contents of hard drive in different categories. Which of the following type of image formats is NOT supported by Forensic Sorter?

Options:
A.

EnCase image file

B.

PFR image file

C.

RAW image file

D.

iso image file

Questions 12

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

Options:
A.

Frequency

B.

Delay

C.

Load

D.

Bandwidth

Questions 13

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

Options:
A.

DriveSpy

B.

Ontrack

C.

Device Seizure

D.

Forensic Sorter

Questions 14

Which of the following is a valid IP address for class B Networks?

Options:
A.

225.128.98.7

B.

80.33.5.7

C.

212.136.45.8

D.

172.157.88.3

Questions 15

You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command. Which of the following commands will you use?

Options:
A.

ping -a

B.

ping -l

C.

ping -t

D.

ping –n

Exam Code: GCIA
Certification Provider: GIAC
Exam Name: GCIA – GIAC Certified Intrusion Analyst Practice Test
Last Update: Sep 12, 2025
Questions: 508